selftests/bpf: Add test for CGROUP_STORAGE map on multiple attaches
authorYiFei Zhu <zhuyifei@google.com>
Fri, 24 Jul 2020 04:47:41 +0000 (23:47 -0500)
committerAlexei Starovoitov <ast@kernel.org>
Sun, 26 Jul 2020 03:16:35 +0000 (20:16 -0700)
This test creates a parent cgroup, and a child of that cgroup.
It attaches a cgroup_skb/egress program that simply counts packets,
to a global variable (ARRAY map), and to a CGROUP_STORAGE map.
The program is first attached to the parent cgroup only, then to
parent and child.

The test cases sends a message within the child cgroup, and because
the program is inherited across parent / child cgroups, it will
trigger the egress program for both the parent and child, if they
exist. The program, when looking up a CGROUP_STORAGE map, uses the
cgroup and attach type of the attachment parameters; therefore,
both attaches uses different cgroup storages.

We assert that all packet counts returns what we expects.

Signed-off-by: YiFei Zhu <zhuyifei@google.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/5a20206afa4606144691c7caa0d1b997cd60dec0.1595565795.git.zhuyifei@google.com
tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c [new file with mode: 0644]
tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c [new file with mode: 0644]

diff --git a/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c b/tools/testing/selftests/bpf/prog_tests/cg_storage_multi.c
new file mode 100644 (file)
index 0000000..e90e054
--- /dev/null
@@ -0,0 +1,161 @@
+// SPDX-License-Identifier: GPL-2.0-only
+
+/*
+ * Copyright 2020 Google LLC.
+ */
+
+#include <test_progs.h>
+#include <cgroup_helpers.h>
+#include <network_helpers.h>
+
+#include "cg_storage_multi_egress_only.skel.h"
+
+#define PARENT_CGROUP "/cgroup_storage"
+#define CHILD_CGROUP "/cgroup_storage/child"
+
+static int duration;
+
+static bool assert_storage(struct bpf_map *map, const char *cgroup_path,
+                          __u32 expected)
+{
+       struct bpf_cgroup_storage_key key = {0};
+       __u32 value;
+       int map_fd;
+
+       map_fd = bpf_map__fd(map);
+
+       key.cgroup_inode_id = get_cgroup_id(cgroup_path);
+       key.attach_type = BPF_CGROUP_INET_EGRESS;
+       if (CHECK(bpf_map_lookup_elem(map_fd, &key, &value) < 0,
+                 "map-lookup", "errno %d", errno))
+               return true;
+       if (CHECK(value != expected,
+                 "assert-storage", "got %u expected %u", value, expected))
+               return true;
+
+       return false;
+}
+
+static bool assert_storage_noexist(struct bpf_map *map, const char *cgroup_path)
+{
+       struct bpf_cgroup_storage_key key = {0};
+       __u32 value;
+       int map_fd;
+
+       map_fd = bpf_map__fd(map);
+
+       key.cgroup_inode_id = get_cgroup_id(cgroup_path);
+       key.attach_type = BPF_CGROUP_INET_EGRESS;
+       if (CHECK(bpf_map_lookup_elem(map_fd, &key, &value) == 0,
+                 "map-lookup", "succeeded, expected ENOENT"))
+               return true;
+       if (CHECK(errno != ENOENT,
+                 "map-lookup", "errno %d, expected ENOENT", errno))
+               return true;
+
+       return false;
+}
+
+static bool connect_send(const char *cgroup_path)
+{
+       bool res = true;
+       int server_fd = -1, client_fd = -1;
+
+       if (join_cgroup(cgroup_path))
+               goto out_clean;
+
+       server_fd = start_server(AF_INET, SOCK_DGRAM, NULL, 0, 0);
+       if (server_fd < 0)
+               goto out_clean;
+
+       client_fd = connect_to_fd(server_fd, 0);
+       if (client_fd < 0)
+               goto out_clean;
+
+       if (send(client_fd, "message", strlen("message"), 0) < 0)
+               goto out_clean;
+
+       res = false;
+
+out_clean:
+       close(client_fd);
+       close(server_fd);
+       return res;
+}
+
+static void test_egress_only(int parent_cgroup_fd, int child_cgroup_fd)
+{
+       struct cg_storage_multi_egress_only *obj;
+       struct bpf_link *parent_link = NULL, *child_link = NULL;
+       bool err;
+
+       obj = cg_storage_multi_egress_only__open_and_load();
+       if (CHECK(!obj, "skel-load", "errno %d", errno))
+               return;
+
+       /* Attach to parent cgroup, trigger packet from child.
+        * Assert that there is only one run and in that run the storage is
+        * parent cgroup's storage.
+        * Also assert that child cgroup's storage does not exist
+        */
+       parent_link = bpf_program__attach_cgroup(obj->progs.egress,
+                                                parent_cgroup_fd);
+       if (CHECK(IS_ERR(parent_link), "parent-cg-attach",
+                 "err %ld", PTR_ERR(parent_link)))
+               goto close_bpf_object;
+       err = connect_send(CHILD_CGROUP);
+       if (CHECK(err, "first-connect-send", "errno %d", errno))
+               goto close_bpf_object;
+       if (CHECK(obj->bss->invocations != 1,
+                 "first-invoke", "invocations=%d", obj->bss->invocations))
+               goto close_bpf_object;
+       if (assert_storage(obj->maps.cgroup_storage, PARENT_CGROUP, 1))
+               goto close_bpf_object;
+       if (assert_storage_noexist(obj->maps.cgroup_storage, CHILD_CGROUP))
+               goto close_bpf_object;
+
+       /* Attach to parent and child cgroup, trigger packet from child.
+        * Assert that there are two additional runs, one that run with parent
+        * cgroup's storage and one with child cgroup's storage.
+        */
+       child_link = bpf_program__attach_cgroup(obj->progs.egress,
+                                               child_cgroup_fd);
+       if (CHECK(IS_ERR(child_link), "child-cg-attach",
+                 "err %ld", PTR_ERR(child_link)))
+               goto close_bpf_object;
+       err = connect_send(CHILD_CGROUP);
+       if (CHECK(err, "second-connect-send", "errno %d", errno))
+               goto close_bpf_object;
+       if (CHECK(obj->bss->invocations != 3,
+                 "second-invoke", "invocations=%d", obj->bss->invocations))
+               goto close_bpf_object;
+       if (assert_storage(obj->maps.cgroup_storage, PARENT_CGROUP, 2))
+               goto close_bpf_object;
+       if (assert_storage(obj->maps.cgroup_storage, CHILD_CGROUP, 1))
+               goto close_bpf_object;
+
+close_bpf_object:
+       bpf_link__destroy(parent_link);
+       bpf_link__destroy(child_link);
+
+       cg_storage_multi_egress_only__destroy(obj);
+}
+
+void test_cg_storage_multi(void)
+{
+       int parent_cgroup_fd = -1, child_cgroup_fd = -1;
+
+       parent_cgroup_fd = test__join_cgroup(PARENT_CGROUP);
+       if (CHECK(parent_cgroup_fd < 0, "cg-create-parent", "errno %d", errno))
+               goto close_cgroup_fd;
+       child_cgroup_fd = create_and_get_cgroup(CHILD_CGROUP);
+       if (CHECK(child_cgroup_fd < 0, "cg-create-child", "errno %d", errno))
+               goto close_cgroup_fd;
+
+       if (test__start_subtest("egress_only"))
+               test_egress_only(parent_cgroup_fd, child_cgroup_fd);
+
+close_cgroup_fd:
+       close(child_cgroup_fd);
+       close(parent_cgroup_fd);
+}
diff --git a/tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c b/tools/testing/selftests/bpf/progs/cg_storage_multi_egress_only.c
new file mode 100644 (file)
index 0000000..ec0165d
--- /dev/null
@@ -0,0 +1,30 @@
+// SPDX-License-Identifier: GPL-2.0-only
+
+/*
+ * Copyright 2020 Google LLC.
+ */
+
+#include <errno.h>
+#include <linux/bpf.h>
+#include <linux/ip.h>
+#include <linux/udp.h>
+#include <bpf/bpf_helpers.h>
+
+struct {
+       __uint(type, BPF_MAP_TYPE_CGROUP_STORAGE);
+       __type(key, struct bpf_cgroup_storage_key);
+       __type(value, __u32);
+} cgroup_storage SEC(".maps");
+
+__u32 invocations = 0;
+
+SEC("cgroup_skb/egress")
+int egress(struct __sk_buff *skb)
+{
+       __u32 *ptr_cg_storage = bpf_get_local_storage(&cgroup_storage, 0);
+
+       __sync_fetch_and_add(ptr_cg_storage, 1);
+       __sync_fetch_and_add(&invocations, 1);
+
+       return 1;
+}